CyberWire Daily cover image

The current state of MITRE ATT&CK.

CyberWire Daily

00:00

Exploring Adversary Behaviors and Threat Intelligence Sources

Exploring the kill chain concept and how it diverges from a linear model by illustrating real adversary behaviors within a network. The chapter highlights the significance of sourcing threat intelligence from platforms like the Diamond Model and security vendor intelligence blogs, showcasing insights from an ESET report on a Chinese hacker group targeting the shipping industry in Europe.

Play episode from 13:52
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app